Metrics
Affected Vendors & Products
Solution
Please upgrade to FortiSOAR version 7.5.0 or above Please upgrade to FortiSOAR version 7.4.1 or above Please upgrade to FortiSOAR version 7.3.3 or above
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-088 |
![]() ![]() |
Thu, 22 Aug 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortisoar |
|
CPEs | cpe:2.3:a:fortinet:fortisoar:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortisoar |
Tue, 13 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 13 Aug 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSOAR 7.3.0 through 7.3.2 allows an authenticated, remote attacker to inject arbitrary web script or HTML via the Communications module. | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-13T16:00:04.582Z
Reserved: 2023-02-20T15:09:20.637Z
Link: CVE-2023-26211

Updated: 2024-08-13T15:59:56.488Z

Status : Analyzed
Published: 2024-08-13T16:15:08.220
Modified: 2024-08-22T14:33:54.453
Link: CVE-2023-26211

No data.

No data.